• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Formal design method of high-performance VLSI datapaths based on computer algebra

Research Project

Project/Area Number 20700041
Research Category

Grant-in-Aid for Young Scientists (B)

Allocation TypeSingle-year Grants
Research Field Computer system/Network
Research InstitutionTohoku University

Principal Investigator

HOMMA Naofumi  Tohoku University, 大学院・情報科学研究科, 准教授 (00343062)

Project Period (FY) 2008 – 2009
Project Status Completed (Fiscal Year 2009)
Budget Amount *help
¥4,160,000 (Direct Cost: ¥3,200,000、Indirect Cost: ¥960,000)
Fiscal Year 2009: ¥2,080,000 (Direct Cost: ¥1,600,000、Indirect Cost: ¥480,000)
Fiscal Year 2008: ¥2,080,000 (Direct Cost: ¥1,600,000、Indirect Cost: ¥480,000)
Keywords計算機システム / システムオンチップ / VLSI設計技術 / 算術アルゴリズム / 形式的設計 / 計算機代数 / データパス / グレブナー基底
Research Abstract

This research project aimed to develop high-level design methodology for arithmetic algorithms, and developed formal verification method of arithmetic algorithms based on computer algebra and its application to arithmetic module generator. In particular, the newly-developed generator can generate typical operations in security systems such as modular exponentiation operations. The generated algorithms can be verified completely by the formal verification method.

Report

(3 results)
  • 2009 Annual Research Report   Final Research Report ( PDF )
  • 2008 Annual Research Report
  • Research Products

    (72 results)

All 2010 2009 2008 Other

All Journal Article (49 results) (of which Peer Reviewed: 47 results) Presentation (19 results) Remarks (3 results) Patent(Industrial Property Rights) (1 results)

  • [Journal Article] Biasing power traces to improve correlation in power analysis attacks2010

    • Author(s)
      Y ongdae Kim, Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, Akashi Satoh
    • Journal Title

      International Workshop on Constructive Side-Channel Analysis and Secure Design 2010

      Pages: 77-80

    • Related Report
      2009 Final Research Report
    • Peer Reviewed
  • [Journal Article] 暗号モジュールへのサイドチャネル攻撃とその安全性評価の動向2010

    • Author(s)
      本間尚文, 青木孝文, 佐藤証
    • Journal Title

      子情報通信学会論文誌A Vol.J93-A,No.2(招待)

      Pages: 42-51

    • NAID

      110007539716

    • Related Report
      2009 Final Research Report
  • [Journal Article] 暗号モジュールへのサイドチャネル攻撃とその安全性評価の動向2010

    • Author(s)
      本間尚文
    • Journal Title

      電子情報通信学会論文誌A J93-A・2

      Pages: 42-51

    • NAID

      110007539716

    • Related Report
      2009 Annual Research Report
  • [Journal Article] Biasing power traces to improve correlation in power analysis attacks2010

    • Author(s)
      Yongdae Kim
    • Journal Title

      International Workshop on Constructive Side-Channel Analysis and Secure Design 2010

      Pages: 77-80

    • Related Report
      2009 Annual Research Report
    • Peer Reviewed
  • [Journal Article] RSA暗号プロセッサのFPGA実装に対する平文選択型SPAの評価2009

    • Author(s)
      宮本篤志, 本間尚文, 青木孝文, 佐藤証
    • Journal Title

      電子情報通信学会論文誌D Vol.J92-D,No.12

      Pages: 2168-2180

    • NAID

      110007482410

    • Related Report
      2009 Final Research Report
    • Peer Reviewed
  • [Journal Article] ハッシュ関数Whirlpoolの高スケーラブル回路アーキテクチャ2009

    • Author(s)
      菅原健, 本間尚文, 青木孝
    • Journal Title

      情報処理学会論文誌 Vol.50,No.11

      Pages: 2618-2632

    • NAID

      110007970544

    • Related Report
      2009 Final Research Report
    • Peer Reviewed
  • [Journal Article] Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules2009

    • Author(s)
      Takeshi Sugawara, Yu-ichi Hayashi Naof umi Homma, Takaaki Mizuki, Takafumi Aoki, Hideaki Sone, Akashi Satoh
    • Journal Title

      Workshop on Information Security Applications - WISA 2009, Lecture Notes in Computer Science 5932

      Pages: 66-78

    • Related Report
      2009 Final Research Report
    • Peer Reviewed
  • [Journal Article] Systematic approach to designing multiple-valued arithmetic circuits based on arithmetic description language2009

    • Author(s)
      Naofumi Homma, Yuki Wata Katsuhi ko Degawa, Takafumi Aoki, Tatsuo Higuchi
    • Journal Title

      Journal of Multiple-Valued Logic and Soft Computing Vol.15,No.4

      Pages: 329-340

    • Related Report
      2009 Final Research Report
    • Peer Reviewed
  • [Journal Article] Side Channel Attack to Magnetic Near Field of Cryptographic LSI and Its Protection by Magnetic Thin Film2009

    • Author(s)
      Masahiro Yamaguchi, Hide Shoichi Kobayashi, Takeshi Sugawara, Naofumi Homma, Akashi Satoh, Takafumi Aoki
    • Journal Title

      Soft Magnetic Materials 19

    • Related Report
      2009 Final Research Report
    • Peer Reviewed
  • [Journal Article] Development of Side-Channel Attack Standard Evaluation Environment2009

    • Author(s)
      Toshihiro Katashita, Ak Takeshi Sugawara, Naofumi Homma, Takafumi Aoki
    • Journal Title

      European Conference on Circuit Theory and Design 2009

      Pages: 403-408

    • Related Report
      2009 Final Research Report
    • Peer Reviewed
  • [Journal Article] Differential Power Analysis of AES ASIC Implementations with Various S-box Circuits2009

    • Author(s)
      Takeshi Takafum i Aoki, Akashi Satoh
    • Journal Title

      European Conference on Circuit Theory and Design 2009

      Pages: 395-398

    • Related Report
      2009 Final Research Report
    • Peer Reviewed
  • [Journal Article] Spectrum Analysis on Cryptographic Modules to Counteract Side-Channel Attacks2009

    • Author(s)
      Takeshi Sugawara, Yu-ichi Hay Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, Hideaki Sone, Akashi Satoh
    • Journal Title

      Proceedings of the 2009 International Symposium on Electromagnetic Compatibility

      Pages: 21-24

    • Related Report
      2009 Final Research Report
    • Peer Reviewed
  • [Journal Article] An Analysis of Information Leakage from a Cryptographic Hardware via Common-Mode Current2009

    • Author(s)
      Yu-ichi Hayashi, Takeshi Yoshiki Kay ano, Naofumi Homma, Takaaki Mizuki, Akashi Satoh, Takafumi Aoki, Shigeki Minegishi, Hideaki Sone, Hiroshi Inoue
    • Journal Title

      Proceedings of the 2009 International Symposium on Electromagnetic Compatibility

      Pages: 17-20

    • Related Report
      2009 Final Research Report
    • Peer Reviewed
  • [Journal Article] Evaluation of Simple/Comparative Power Analysis Against an RSA ASIC Implementation2009

    • Author(s)
      Atsushi Miyamoto, Naofum Takafumi Aoki, Akashi Satoh
    • Journal Title

      Proceedings of the 2009 IEEE International Symposium on Circuits and Systems

      Pages: 2918-2921

    • Related Report
      2009 Final Research Report
    • Peer Reviewed
  • [Journal Article] Multiple-Valued Constant-Power Adder for Cryptographic Processor2009

    • Author(s)
      Yuichi Baba, At Naofumi Homma, Takafumi Aoki
    • Journal Title

      Proceedings of the 39th International Symposium on Multiple Valued Logic

      Pages: 239-244

    • Related Report
      2009 Final Research Report
    • Peer Reviewed
  • [Journal Article] An experimental comparison of power analysis attacks against RSA processors on ASIC and FPGA2009

    • Author(s)
      Atsushi Miyamoto, Naofumi Takafumi Aoki, Akashi Satoh
    • Journal Title

      Proceedings of the 15th Workshop on Synthesis And System Integration of Mixed Information technologies

      Pages: 58-63

    • Related Report
      2009 Final Research Report
    • Peer Reviewed
  • [Journal Article] Compact ASIC Architectures for the 512-bit Hash Function Whirlpool2009

    • Author(s)
      Takeshi Sugawara, Naofumi Takafumi Aoki, Akashi Satoh
    • Journal Title

      Workshop on Information Security Applications - WISA 2008, Lecture Notes in Computer Science 5379

      Pages: 28-40

    • Related Report
      2009 Final Research Report
    • Peer Reviewed
  • [Journal Article] Systematic approach to designing multiple-valued arithmetic circuits based on arithmetic description language2009

    • Author(s)
      本間尚文
    • Journal Title

      Journal of Multiple-Valued Logic and Soft Computing 15-4

      Pages: 329-340

    • Related Report
      2009 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Multiple-Valued Constant-Power Adder for Cryptographic Processor2009

    • Author(s)
      Yuichi Baba
    • Journal Title

      Proceedings of the 39th International Symposium on Multiple Valued Logic 1

      Pages: 239-244

    • Related Report
      2009 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Evaluation of Simple/Comparative Power Analysis Against an RSA ASIC Implementation2009

    • Author(s)
      宮本篤志
    • Journal Title

      Proceedings of the 2009 IEEE International Symposium on Circuits and Systems

      Pages: 2918-2921

    • Related Report
      2009 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Differential Power Analysis of AES ASIC Implementations with Various S-box Circuits2009

    • Author(s)
      菅原健
    • Journal Title

      European Conference on Circuit Theory and Design 2009

      Pages: 395-398

    • Related Report
      2009 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Development of Side-Channel Attack Standard Evaluation Environment2009

    • Author(s)
      Toshihiro Katashita
    • Journal Title

      European Conference on Circuit Theory and Design 2009

      Pages: 403-408

    • Related Report
      2009 Annual Research Report
    • Peer Reviewed
  • [Journal Article] ハッシュ関数 Whirlpool の高スケーラブル回路アーキテクチャ2009

    • Author(s)
      菅原健
    • Journal Title

      情報処理学会論文誌 50・11

      Pages: 2618-2632

    • Related Report
      2009 Annual Research Report
    • Peer Reviewed
  • [Journal Article] RSA暗号プロセッサのFPGA実装に対する平文選択型SPAの評価2009

    • Author(s)
      宮本篤志
    • Journal Title

      電子情報通信学会論文誌D J92-D・12

      Pages: 2168-2180

    • Related Report
      2009 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Arithmetic module generator with algorithm optimization capability2009

    • Author(s)
      Yuki Watanabe
    • Journal Title

      Proceedings of the 2008 IEEE International Symposium on Circuits and Systems

      Pages: 1796-1799

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Enhanced Correlation Power Analysis using Key Screening Techniques2008

    • Author(s)
      Tosh Takeshi Sug awara, Naofumi Homma, Takafumi Aoki
    • Journal Title

      2008 International Conference on ReConFigurable Computing and FPGAs

      Pages: 403-408

    • Related Report
      2009 Final Research Report
    • Peer Reviewed
  • [Journal Article] A Systematic Approach for Designing Redundant Arithmetic Adders Based on Counter Tree Diagrams2008

    • Author(s)
      Naofumi Homma, Takafu Tatsuo H iguchi
    • Journal Title

      IEEE Transactions on Computers Vol.57,No.12

      Pages: 1633-1646

    • Related Report
      2009 Final Research Report
    • Peer Reviewed
  • [Journal Article] Systematic design of high-radix Montgomery multipliers for RSA processors2008

    • Author(s)
      Atsushi Miyamoto, Naofumi Homm Takafumi Aoki, Akashi Satoh
    • Journal Title

      Proceedings of the 26th IEEE International Conference of Computer Design

      Pages: 416-421

    • Related Report
      2009 Final Research Report
    • Peer Reviewed
  • [Journal Article] Arithmetic Circuit Verification Based on Symbolic Computer Algebra2008

    • Author(s)
      Yuki Watanabe, Na Takafu mi Aoki, Tatsuo Higuchi
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol.E91-A,No.10

      Pages: 3038-3046

    • Related Report
      2009 Final Research Report
    • Peer Reviewed
  • [Journal Article] Chosen-message SPA attacks against FPGA-based RSA hardware implementations2008

    • Author(s)
      Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, Akashi Satoh
    • Journal Title

      Proceedings of the 2008 International Conference on Field Programmable Logic and Applications

      Pages: 35-40

    • Related Report
      2009 Final Research Report
    • Peer Reviewed
  • [Journal Article] High-performance concurrent error detection scheme for AES hardware2008

    • Author(s)
      Akashi Satoh Naofumi Homma, Takafumi Aoki
    • Journal Title

      Cryptographic Hardware and Embedded Systems - CHES 2008, Lecture Notes in Computer Science 5154

      Pages: 100-112

    • Related Report
      2009 Final Research Report
    • Peer Reviewed
  • [Journal Article] Collision-based power analysis of modular exponentiation using chosen-message pairs2008

    • Author(s)
      Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Akashi Satoh, Adi Shamir
    • Journal Title

      Cryptographic Hardware and Embedded Systems - CHES 2008, Lecture Notes in Computer Science 5154

      Pages: 15-29

    • Related Report
      2009 Final Research Report
    • Peer Reviewed
  • [Journal Article] Power analysis of RSA processors with high-radix Montgomery multipliers2008

    • Author(s)
      Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Akashi Satoh
    • Journal Title

      Proceedings of 17th International Workshop on Post-Binary ULSI Systems

      Pages: 21-24

    • Related Report
      2009 Final Research Report
    • Peer Reviewed
  • [Journal Article] High-level design of multiple-valued arithmetic circuits based on arithmetic description language2008

    • Author(s)
      Yuki Watanabe, Naofumi Katsuh iko Degawa, Takafumi Aoki, Tatsuo Higuchi
    • Journal Title

      Proceedings of the 38th IEEE International Symposium on Multiple-Valued Logic No.31

      Pages: 112-117

    • Related Report
      2009 Final Research Report
    • Peer Reviewed
  • [Journal Article] Enhanced power analysis attack using chosen message against RSA hardware implementations2008

    • Author(s)
      Atsushi Miyamoto, Naofumi Takafumi Aoki, Akashi Satoh
    • Journal Title

      Proceedings of the 2008 IEEE International Symposium on Circuits and Systems

      Pages: 3282-3285

    • Related Report
      2009 Final Research Report
    • Peer Reviewed
  • [Journal Article] High-performance ASIC implementations of the 128-bit block cipher CLEFIA2008

    • Author(s)
      Takeshi Sugawara, Takafumi Aoki, Akashi Satoh
    • Journal Title

      Proceedings of the 2008 IEEE International Symposium on Circuits and Systems

      Pages: 2925-2928

    • Related Report
      2009 Final Research Report
    • Peer Reviewed
  • [Journal Article] Arithmetic module generator with algorithm optimization capability2008

    • Author(s)
      Yuki Watanabe, Takafu mi Aoki, Tatsuo Higuchi
    • Journal Title

      Proceedings of the 2008 IEEE International Symposium on Circuits and Systems

      Pages: 1796-1799

    • Related Report
      2009 Final Research Report
    • Peer Reviewed
  • [Journal Article] High-performance ASIC implementations of the 128-bit block cipher CLEFIA2008

    • Author(s)
      Takeshi Sugawara
    • Journal Title

      Proceedings of the 2008 IEEE International Symposium on Circuits and Systems

      Pages: 2925-2928

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Enhanced power analysis attack using chosen message against RSA hardware implementations2008

    • Author(s)
      Atsushi Miyamoto
    • Journal Title

      Proceedings of the 2008 IEEE International Symposium on Circuits and Systems

      Pages: 3282-3285

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] High-level design of multiple-valued arithmetic circuits based on arithmetic description language2008

    • Author(s)
      Yuki Watanabe
    • Journal Title

      Proceedings of the 38th IEEE International Symposium on Multiple-Valued Logic

      Pages: 112-117

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Power analysis of RSA processors with high-radix Montgomery multipliers2008

    • Author(s)
      Naofumi Homma
    • Journal Title

      Proceedings of 17th International Workshop on Post-Binary ULSI Systems

      Pages: 21-24

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Collision-based power analysis of modular exponentiation using chosen-message pairs2008

    • Author(s)
      Naofumi Homma
    • Journal Title

      Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science 5154

      Pages: 15-29

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] High-performance concurrent error detection scheme for AES hardware2008

    • Author(s)
      Akashi Satoh
    • Journal Title

      Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science 5154

      Pages: 100-112

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Chosen-message SPA attacks against FPGA-based RSA hardware implementations2008

    • Author(s)
      Atsushi Miyamoto
    • Journal Title

      Proceedings of the 2008 International Conference on Field Programmable Logic and Applications

      Pages: 35-40

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Systematic design of high-radix Montgomery multipliers for RSA processors2008

    • Author(s)
      Atsushi Miyamoto
    • Journal Title

      Proceedings of the 26th IEEE International Conference of Computer Design

      Pages: 416-421

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Arithmetic Circuit Verification Based on Symbolic Computer Algebra2008

    • Author(s)
      Yuki Watanabe
    • Journal Title

      IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences E91-A

      Pages: 3038-3046

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Systematic Approach for Designing Redundant Arithmetic Adders Based on Counter Tree Diagrams2008

    • Author(s)
      Naofumi Homma
    • Journal Title

      IEEE Transactions on Computers 57

      Pages: 1633-1646

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Enhanced Correlation Power Analysis using Key Screening Techniques2008

    • Author(s)
      Toshihiro Katashita
    • Journal Title

      2008 International Conference on ReConFigurable Computing and FPGAs

      Pages: 403-408

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Compact ASIC Architectures for the 512-bit Hash Function Whirlpool2008

    • Author(s)
      Takeshi Sugawara
    • Journal Title

      Workshop on Information Security Applications, Lecture Notes in Computer Science 5379

      Pages: 28-40

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Presentation] 重回帰分析を用いたサイドチャネル攻撃の高精度化2009

    • Author(s)
      金用大
    • Organizer
      コンピュータセキュリティシンポジウム2009
    • Place of Presentation
      富山
    • Year and Date
      2009-10-26
    • Related Report
      2009 Annual Research Report
  • [Presentation] 電流モード多値論理を用いた暗号ハードウェアの安全性に関する検討2009

    • Author(s)
      馬場祐一
    • Organizer
      第32回多値論理フォーラム
    • Place of Presentation
      札幌
    • Year and Date
      2009-09-10
    • Related Report
      2009 Annual Research Report
  • [Presentation] 帯域分割法に基づく広帯域信号計測2009

    • Author(s)
      ファジャルメガプラタマ
    • Organizer
      第8回情報科学技術フォーラム
    • Place of Presentation
      仙台
    • Year and Date
      2009-09-04
    • Related Report
      2009 Annual Research Report
  • [Presentation] RSA暗号プロセッサジェネレータの設計と評価2009

    • Author(s)
      馬場祐一
    • Organizer
      第8回情報科学技術フォーラム
    • Place of Presentation
      仙台
    • Year and Date
      2009-09-02
    • Related Report
      2009 Annual Research Report
  • [Presentation] AESのハードウェア実装に対するテンプレート攻撃2009

    • Author(s)
      金用大
    • Organizer
      第8回情報科学技術フォーラム
    • Place of Presentation
      仙台
    • Year and Date
      2009-09-02
    • Related Report
      2009 Annual Research Report
  • [Presentation] サイドチャネル攻撃評価用ISO/IEC標準暗号プロセッサの開発2009

    • Author(s)
      本間尚文
    • Organizer
      2009年11音号と情報セキュリティシンポジウム
    • Place of Presentation
      滋賀県大津市
    • Year and Date
      2009-01-21
    • Related Report
      2008 Annual Research Report
  • [Presentation] べき乗剰余演算に対する比較電力解析の応用2009

    • Author(s)
      宮本篤志
    • Organizer
      2009年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      滋賀県大津市
    • Year and Date
      2009-01-21
    • Related Report
      2008 Annual Research Report
  • [Presentation] 最近傍から計測した磁界を用いた差分電磁波解析2009

    • Author(s)
      菅原健
    • Organizer
      2009年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      滋賀県大津市
    • Year and Date
      2009-01-21
    • Related Report
      2008 Annual Research Report
  • [Presentation] CPAに対するデカップリングキャパシタの影響の予備検証2009

    • Author(s)
      片下敏宏
    • Organizer
      2009年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      滋賀県大津市
    • Year and Date
      2009-01-21
    • Related Report
      2008 Annual Research Report
  • [Presentation] 暗号モジュールに対するサイドチャネル攻撃とその対策2008

    • Author(s)
      本間尚文
    • Organizer
      第5回マルチメディア情報ハイディング研究会
    • Place of Presentation
      宮城県仙台市(招待講演)
    • Year and Date
      2008-11-06
    • Related Report
      2008 Annual Research Report
  • [Presentation] 鍵候補の篩い分けによるCiPAの高速化と鍵推定精度の向上2008

    • Author(s)
      片下敏宏
    • Organizer
      コンピュータセキュリティシンポジウム2008
    • Place of Presentation
      沖縄県那覇市
    • Year and Date
      2008-10-08
    • Related Report
      2008 Annual Research Report
  • [Presentation] 電源ライン上の漏洩情報を用いたサイドチャネル攻撃2008

    • Author(s)
      林優一
    • Organizer
      コンピュータセキュリティシンポジウム2008
    • Place of Presentation
      沖縄県那覇市
    • Year and Date
      2008-10-08
    • Related Report
      2008 Annual Research Report
  • [Presentation] 標準評価基板上のASICへの差分電力解析実験2008

    • Author(s)
      菅原健
    • Organizer
      コンピュータセキュリティシンポジウム2008
    • Place of Presentation
      沖縄県那覇市
    • Year and Date
      2008-10-08
    • Related Report
      2008 Annual Research Report
  • [Presentation] 電流モード多値論理を用いた耐タンパー性暗号ハードウェアに関する検討2008

    • Author(s)
      馬場祐一
    • Organizer
      第31回多値論理フォーラム
    • Place of Presentation
      沖縄県那覇市
    • Year and Date
      2008-09-12
    • Related Report
      2008 Annual Research Report
  • [Presentation] 高基数モンゴメリ乗算に基づくRSA暗号の高性能ハードウェア実装2008

    • Author(s)
      馬場祐一
    • Organizer
      平成20年度電気関係学会東北支部連合大会
    • Place of Presentation
      幅島県郡山市
    • Year and Date
      2008-08-21
    • Related Report
      2008 Annual Research Report
  • [Presentation] 特定入力ペアを用いたRSA暗号に対する電力解析攻撃の実験的評価2008

    • Author(s)
      宮本篶志
    • Organizer
      マルチメディア, 分散, 協調とモバイルシンポジウム
    • Place of Presentation
      北海道札幌市
    • Year and Date
      2008-07-09
    • Related Report
      2008 Annual Research Report
  • [Presentation] シフトレジスタ・アーキテクチャによるハッシュ関数Whirlpoolの高性能回路実装2008

    • Author(s)
      菅原健
    • Organizer
      マルチメディア, 分散, 協調とモバイルシンポジウム
    • Place of Presentation
      北海道札幌市
    • Year and Date
      2008-07-09
    • Related Report
      2008 Annual Research Report
  • [Presentation] ブロック暗号AESの高性能エラー検出回路方式2008

    • Author(s)
      佐藤証
    • Organizer
      マルチメディア, 分散, 協調とモバイルシンポジウム
    • Place of Presentation
      北海道札幌市
    • Year and Date
      2008-07-09
    • Related Report
      2008 Annual Research Report
  • [Presentation] 算術アルゴリズム記述言語に基づく多値論理回路の設計2008

    • Author(s)
      渡邉裕樹
    • Organizer
      第21回回路とシステム軽井沢ワークショップ
    • Place of Presentation
      長野県軽井沢市
    • Year and Date
      2008-04-21
    • Related Report
      2008 Annual Research Report
  • [Remarks]

    • URL

      http://www.aoki./mg/index.html

    • Related Report
      2009 Final Research Report
  • [Remarks]

    • URL

      http://www.aoki.ecei.tohoku.ac.jp/arith/mg/index.html

    • Related Report
      2009 Annual Research Report
  • [Remarks]

    • URL

      http://www.aoki.ecei.tohoku.ac.jp/arith/mg/index.html

    • Related Report
      2008 Annual Research Report
  • [Patent(Industrial Property Rights)] 誤り検出機能を備える, 符号化又は復号処理のための回路構成2008

    • Inventor(s)
      佐藤証, 菅原健, 本間尚文, 青木孝文
    • Industrial Property Rights Holder
      佐藤証, 菅原健, 本間尚文, 青木孝文
    • Industrial Property Number
      2008-130361
    • Filing Date
      2008-05-19
    • Related Report
      2008 Annual Research Report

URL: 

Published: 2008-04-01   Modified: 2016-04-21  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi